[SUSE-SU-2024:0118-1] Security update for the Linux Kernel
Severity
Important
CVEs
8
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237).
- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095).
- CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250).
- CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947).
- CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946).
- CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218258).
- CVE-2023-6932: Fixed a use-after-free issue when receiving an IGMP query packet due to reference count mismanagement (bsc#1218253).
- CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559).
The following non-security bugs were fixed:
- Enabled the LLC counters for “perf” (perf stat) on the Ice-Lake and Rocket-Lake CPUs (jsc#PED-5023 bsc#1211439).
- Reviewed and added more information to README.SUSE (jsc#PED-5021).
- Enabled multibuild for kernel packages (JSC-SLE#5501, boo#1211226, bsc#1218184).
- Fix termination state for idr_for_each_entry_ul() (bsc#1109837).
- KVM: s390/mm: Properly reset no-dat (bsc#1218057).
- KVM: s390: vsie: fix wrong VIR 37 when MSO is used (bsc#1217936).
- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1218622).
- Previous perf cve-4.12->SLE12-SP5 manual merge was incorrect. Fix.
- gve: Add XDP DROP and TX support for GQI-QPL format (bsc#1214479).
- gve: Add XDP REDIRECT support for GQI-QPL format (bsc#1214479).
- gve: Changes to add new TX queues (bsc#1214479).
- gve: Control path for DQO-QPL (bsc#1214479).
- gve: Do not fully free QPL pages on prefill errors (bsc#1214479).
- gve: Fix gve interrupt names (bsc#1214479).
- gve: Fixes for napi_poll when budget is 0 (bsc#1214479).
- gve: RX path for DQO-QPL (bsc#1214479).
- gve: Set default duplex configuration to full (bsc#1214479).
- gve: Tx path for DQO-QPL (bsc#1214479).
- gve: Unify duplicate GQ min pkt desc size constants (bsc#1214479).
- gve: XDP support GQI-QPL: helper function changes (bsc#1214479).
- gve: fix frag_list chaining (bsc#1214479).
- gve: trivial spell fix Recive to Receive (bsc#1214479).
- gve: unify driver name usage (bsc#1214479).
- net/tg3: fix race condition in tg3_reset_task() (bsc#1217801).
- net/tg3: resolve deadlock in tg3_reset_task() during EEH (bsc#1217801).
- s390/vx: fix save/restore of fpu kernel context (bsc#1218362).
- tracing: Fix a possible race when disabling buffered events (bsc#1217036).
- tracing: Fix a warning when allocating buffered events fails (bsc#1217036).
- tracing: Fix incomplete locking when disabling buffered events (bsc#1217036).
- tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036).
- ID
- SUSE-SU-2024:0118-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2024/suse-su-20240118-1/
- Published
-
2024-01-16T12:31:39
(8 months ago) - Modified
-
2024-01-16T12:31:39
(8 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1773
- ALAS-2024-1899
- ALAS-2024-1906
- ALAS-2024-1912
- ALAS2-2023-2100
- ALAS2-2024-2391
- ALAS2-2024-2418
- ALAS2-2024-2443
- ALSA-2022:7683
- ALSA-2022:8267
- ALSA-2024:0897
- ALSA-2024:1607
- ALSA-2024:3138
- ALSA-2024:4211
- ASB-A-174626251
- CISA-2024:0626
- DSA-5207-1
- DSA-5593-1
- DSA-5594-1
- ELSA-2022-7683
- ELSA-2022-8267
- ELSA-2022-9827
- ELSA-2022-9828
- ELSA-2022-9829
- ELSA-2022-9830
- ELSA-2024-0897
- ELSA-2024-12110
- ELSA-2024-12159
- ELSA-2024-12169
- ELSA-2024-1248
- ELSA-2024-1607
- ELSA-2024-2394
- ELSA-2024-3138
- ELSA-2024-4211
- FEDORA-2021-a35b44fd9f
- FEDORA-2022-484e226872
- FEDORA-2022-9bbb1d9b7b
- RHSA-2022:7444
- RHSA-2022:7683
- RHSA-2022:7933
- RHSA-2022:8267
- RHSA-2024:0881
- RHSA-2024:0897
- RHSA-2024:1607
- RHSA-2024:1614
- RHSA-2024:2950
- RHSA-2024:3138
- RHSA-2024:4211
- RHSA-2024:4352
- RLSA-2022:7683
- RLSA-2024:1607
- RLSA-2024:3138
- RLSA-2024:4211
- SSA:2022-237-02
- SSA:2023-359-01
- SUSE-SU-2022:3585-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3704-1
- SUSE-SU-2022:3775-1
- SUSE-SU-2022:3809-1
- SUSE-SU-2022:3844-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2024:0110-1
- SUSE-SU-2024:0112-1
- SUSE-SU-2024:0113-1
- SUSE-SU-2024:0115-1
- SUSE-SU-2024:0117-1
- SUSE-SU-2024:0120-1
- SUSE-SU-2024:0129-1
- SUSE-SU-2024:0141-1
- SUSE-SU-2024:0153-1
- SUSE-SU-2024:0154-1
- SUSE-SU-2024:0156-1
- SUSE-SU-2024:0160-1
- SUSE-SU-2024:0331-1
- SUSE-SU-2024:0339-1
- SUSE-SU-2024:0344-1
- SUSE-SU-2024:0347-1
- SUSE-SU-2024:0348-1
- SUSE-SU-2024:0351-1
- SUSE-SU-2024:0352-1
- SUSE-SU-2024:0358-1
- SUSE-SU-2024:0362-1
- SUSE-SU-2024:0373-1
- SUSE-SU-2024:0376-1
- SUSE-SU-2024:0378-1
- SUSE-SU-2024:0380-1
- SUSE-SU-2024:0389-1
- SUSE-SU-2024:0393-1
- SUSE-SU-2024:0395-1
- SUSE-SU-2024:0409-1
- SUSE-SU-2024:0411-1
- SUSE-SU-2024:0414-1
- SUSE-SU-2024:0418-1
- SUSE-SU-2024:0421-1
- SUSE-SU-2024:0428-1
- SUSE-SU-2024:0429-1
- SUSE-SU-2024:0484-1
- SUSE-SU-2024:0986-1
- SUSE-SU-2024:0989-1
- SUSE-SU-2024:0991-1
- SUSE-SU-2024:0995-1
- SUSE-SU-2024:1017-1
- SUSE-SU-2024:1023-1
- SUSE-SU-2024:1025-1
- SUSE-SU-2024:1028-1
- SUSE-SU-2024:1039-1
- SUSE-SU-2024:1040-1
- SUSE-SU-2024:1045-1
- SUSE-SU-2024:1047-1
- SUSE-SU-2024:1053-1
- SUSE-SU-2024:1063-1
- SUSE-SU-2024:1072-1
- SUSE-SU-2024:1097-1
- SUSE-SU-2024:1153-1
- SUSE-SU-2024:1677-1
- SUSE-SU-2024:1680-1
- SUSE-SU-2024:1686-1
- SUSE-SU-2024:1695-1
- SUSE-SU-2024:1696-1
- SUSE-SU-2024:1706-1
- SUSE-SU-2024:1709-1
- SUSE-SU-2024:1712-1
- SUSE-SU-2024:1720-1
- SUSE-SU-2024:1726-1
- SUSE-SU-2024:1729-1
- SUSE-SU-2024:1732-1
- SUSE-SU-2024:1735-1
- SUSE-SU-2024:1736-1
- SUSE-SU-2024:1739-1
- SUSE-SU-2024:1742-1
- SUSE-SU-2024:1748-1
- SUSE-SU-2024:1751-1
- SUSE-SU-2024:1757-1
- SUSE-SU-2024:2099-1
- SUSE-SU-2024:2115-1
- SUSE-SU-2024:2145-1
- SUSE-SU-2024:2166-1
- SUSE-SU-2024:2202-1
- SUSE-SU-2024:2205-1
- USN-5343-1
- USN-5557-1
- USN-5560-1
- USN-5560-2
- USN-5562-1
- USN-5564-1
- USN-5565-1
- USN-5566-1
- USN-5567-1
- USN-5582-1
- USN-6601-1
- USN-6602-1
- USN-6603-1
- USN-6604-1
- USN-6604-2
- USN-6605-1
- USN-6605-2
- USN-6606-1
- USN-6607-1
- USN-6608-1
- USN-6608-2
- USN-6609-1
- USN-6609-2
- USN-6609-3
- USN-6628-1
- USN-6628-2
- USN-6635-1
- USN-6639-1
- USN-6680-1
- USN-6680-2
- USN-6680-3
- USN-6681-1
- USN-6681-2
- USN-6681-3
- USN-6681-4
- USN-6686-1
- USN-6686-2
- USN-6686-3
- USN-6686-4
- USN-6686-5
- USN-6688-1
- USN-6701-1
- USN-6701-2
- USN-6701-3
- USN-6701-4
- USN-6705-1
- USN-6716-1
- USN-6724-1
- USN-6724-2
- USN-6739-1
- USN-6740-1
- VU:799380
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |